Cipher key setting system, access point, and cipher key setting method

a technology of access points and cipher keys, applied in wireless communication, digital transmission, transportation and packaging, etc., can solve the problems that the security environment cannot be optimized between wireless lan devices participating in the network, and achieve the effect of relieve the troublesomeness of performing notifications, and prevent the effect of lowering security

Inactive Publication Date: 2005-10-27
BUFFALO CORP LTD
View PDF9 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0022] In the fifth aspect of the invention constructed as the above, the cipher key transmitting means on the access point side transmits to a terminal by wireless the cipher systems narrowed by the cipher systems transmitted by the cipher system transmitting means on the terminal side and the cipher keys used in each of the narrowed cipher systems, of the cipher systems that the access point can adapt itself to. And, the cipher key storing means on the terminal side stores each of the cipher keys corresponding to each of the cipher systems transmitted from the access point in a predetermined storage area. In consequence, the terminals are able to acquire the cipher systems that the terminals and the access point can commonly adopt and the cipher keys used in the cipher systems. And, the cipher systems narrowed by the cipher systems and the cipher keys used in each of the narrowed cipher systems are transmitted from the access point to the terminal side. Thereby, it will be unnecessary to notify the cipher keys anew, even if the access point switches the cipher system afterwards. This will relieve troublesomeness of performing notifications, and will prevent lowering of security accompanied with notifying the cipher keys at the same time.
[0023] According to a sixth aspect, the construction may be made such that the cipher key transmitting means on the access point side transmits the narrowed cipher systems and the cipher keys used in each of the narrowed cipher systems to the terminal, only once when the cipher systems are transmitted by the cipher system transmitting means of the terminal concerned on the terminal side. That is, to transmit the narrowed cipher systems and the cipher keys from the access to the terminal only once will make it unnecessary to notify the cipher keys anew, even if the access point switches the cipher system afterwards. This will relieve troublesomeness of performing notifications to a great extent, and will prevent lowering of the security accompanied with notifying the cipher keys at the same time significantly.

Problems solved by technology

However, the invention described in the application leaves technical problems as follows.
In consequence, after a terminal withdraws from the network, there remains a problem that the security environments cannot necessarily be optimized between wireless LAN devices participating in the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key setting system, access point, and cipher key setting method
  • Cipher key setting system, access point, and cipher key setting method
  • Cipher key setting system, access point, and cipher key setting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The preferred embodiments of the invention will be described in the following order. [0051] 1. Schematic construction for implementing the cipher key setting system [0052] 2. Concrete contents of the cipher key setting system

[0053] 2-1. case of increasing the terminal number

[0054] 2-2 case of decreasing the terminal number [0055] 3. Modified examples [0056] 4. Conclusion

1. Schematic Construction for Implementing the Cipher Key Setting System

[0057]FIG. 1 illustrates a construction of hardware that implements the cipher key setting system relating to the invention. FIG. 2 illustrates a construction of an access point 20.

[0058] The cipher key setting system performs a wireless communication between a specified terminal and the access point 20 in a wireless LAN communication area AR1, in which the cipher key data representing the contents of the cipher key are superposed on a radio wave; and thereby, the system sets the cipher key used in the wireless communication between ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a cipher key setting system wherein the access point detects the terminals connected to the wireless LAN through the access point itself repeatedly at each predetermined time, reviews the adopted cipher systems when there are replacements of the terminals participating in the wireless LAN and a decrease in the number of the terminals, and adopts a cipher system according to the guideline ‘selecting the cipher system of the highest security level among the cipher systems that the devices building up the network can commonly adopt’. The system prevents the security setting from being maintained at a needlessly low level, after a certain terminal withdrew from the network or after some terminals were replaced.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to a cipher key setting system, an access point, and a cipher key setting method. [0003] 2. Description of the Related Art [0004] To build up a communication network with an access point being a repeater for a wireless LAN needs to attain a high security level of the network, which prevents fraudulent intrusion into the network and the leakage of communication data to a third party and so forth. Accordingly, various security techniques on the wireless LAN have been disclosed thus far. [0005] For example, a technique is proposed which utilizes MAC (Media Access Control) addresses being inherent identification numbers assigned in advance to wireless LAN interfacing devices (for example, wireless LAN adapters) mounted on terminals. This technique registers the MAC addresses to an access point, makes the access point authenticate the MAC addresses accompanied with the accesses from the term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08H04K1/00H04L12/28H04L29/06H04W12/02H04W12/04H04W24/00H04W84/12
CPCH04L63/062H04L63/105H04L63/205H04W84/12H04W88/08H04W12/02H04W12/67B65B5/10B65B35/30B65B35/56B65G47/26B65G2201/0238
Inventor TAMURA, YOSHITERU
Owner BUFFALO CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products